Cryptography and network security : principles and practice

By: Stallings, WilliamPublication details: Noida: Pearson India, [c2023]Edition: Indian editionDescription: 832 pISBN: 9789357059718LOC classification: TK5105.59 .S713
Contents:
Table of Contents: 1. Information and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Lightweight Cryptography and Post-Quantum Cryptography 15. Key Management and Distribution 16. User Authentication Protocols 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security 21. Network Endpoint Security 22. Cloud Security 23. Internet of Things (IoT) Security Appendix A. Basic Concepts from Linear Algebra Appendix B. Measures of Security and Secrecy Appendix C. Data Encryption Standard (DES) Appendix D. Simplified AES Appendix E. Mathematical Basis of the Birthday Attack
Summary: Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.---Summary provided by the publisher
List(s) this item appears in: New Arrivals | New Arrivals of books
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Shelving location Call number Status Date due Barcode Item holds
Book Book ICTS
Rack No 14 TK5105.59 .S713 (Browse shelf (Opens below)) Checked out 08/12/2024 02832
Total holds: 0

Table of Contents:
1. Information and Network Security Concepts
2. Introduction to Number Theory
3. Classical Encryption Techniques
4. Block Ciphers and the Data Encryption Standard
5. Finite Fields
6. Advanced Encryption Standard
7. Block Cipher Operation
8. Random Bit Generation and Stream Ciphers
9. Public-Key Cryptography and RSA
10. Other Public-Key Cryptosystems
11. Cryptographic Hash Functions
12. Message Authentication Codes
13. Digital Signatures
14. Lightweight Cryptography and Post-Quantum Cryptography
15. Key Management and Distribution
16. User Authentication Protocols
17. Transport-Level Security
18. Wireless Network Security
19. Electronic Mail Security
20. IP Security
21. Network Endpoint Security
22. Cloud Security
23. Internet of Things (IoT) Security
Appendix A. Basic Concepts from Linear Algebra
Appendix B. Measures of Security and Secrecy
Appendix C. Data Encryption Standard (DES)
Appendix D. Simplified AES
Appendix E. Mathematical Basis of the Birthday Attack

Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.---Summary provided by the publisher

There are no comments on this title.

to post a comment.